We offers the most current and best training materials of the 400-101 certification Q&A , Practice Software, Study Packs, Preparation Labs and Audio Training you are looking for. Our online certification training offers you quick and cost-efficient way to train and become a certified professional in IT industry.

QUESTION 1070 A network engineer is extending a LAN segment between two geographically separated data centers. Which enhancement to a spanning-tree design prevents unnecessary traffic from crossing the extended LAN segment?

A. Modify the spanning-tree priorities to dictate the traffic flow. B. Create a Layer 3 transit VLAN to segment the traffic between the sites. C. Use VTP pruning on the trunk interfaces. D. Configure manual trunk pruning between the two locations.

Answer: C

QUESTION 1071 The OSPF database of a router shows LSA types 1, 2, 3 and 7 only. Which type of area is this router connected to?

A. backbone area B. totally stubby area C. stub area D. not-so-stubby area

Answer: D

QUESTION 1072 Which feature can you implement to most effectively protect customer traffic in a rate-limited WAN Ethernet service?

QUESTION 1073 An engineer has configured a router to use EUI-64, and was asked to document the IPv6 address of the router. The router has the following interface parameters: mac address C601.420F.0007 subnet 2001:DB8:0:1::/64

QUESTION 1076 Which three components are in an MPLS header? (choose three)

A. a 4-bit experimental use field B. a 4-bit label stack entry C. an 8-bit TTL D. a 2-bottom of stack E. a 3-bit experimental use field F. a 20-bit label

Answer: CEF

QUESTION 1077 What is the main function of VRF-lite?

A. To allow devices to use labels to make Layer 2 Path decisions B. To segregate multiple routing tables on a single device C. To connect different autonomous systems together to share routes D. To route IPv6 traffic across an IPv4 backbone

Answer: B

QUESTION 1078 Refer to the exhibit. Which prefixes will have their distance changed?

QUESTION 1079 Which two methods do IPsec VTIs used to identify and transmit encrypted traffic through the tunnel? (choose two)

A. static routing B. dynamic routing C. object groups D. ACLs E. NAT

Answer: AB

QUESTION 1080 When you deploy DMVPN, what is the purpose of the command crypto isakmp key ciscotest address 0.0.0.0 0.0.0.0 ?

A. It is configured on hub and spoke router to establish peering B. It is configured on hub to set the pre-shared key for the spoke routers C. It is configured on the spokes to indicate the hub router D. It is configured on the Internet PE routers to allow traffic to traverse the ISP core

Answer: B

Lead2pass !!!]

The strength of our 400-101 training products is the constant update that we perform to keep abreast with the market trends and changes. Our 400-101 training program is not only the best option for certification but also enhances your skill to an advance level.